Secret Information of Wireless Multi-Dimensional Gaussian Channels
暂无分享,去创建一个
[1] Sneha Kumar Kasera,et al. Secret Key Extraction from Wireless Signal Strength in Real Environments , 2013, IEEE Trans. Mob. Comput..
[2] Rudolf Ahlswede,et al. Common randomness in information theory and cryptography - I: Secret sharing , 1993, IEEE Trans. Inf. Theory.
[3] Whitfield Diffie,et al. New Directions in Cryptography , 1976, IEEE Trans. Inf. Theory.
[4] Amiel Feinstein,et al. Information and information stability of random variables and processes , 1964 .
[5] Joseph M. Kahn,et al. Fading correlation and its effect on the capacity of multielement antenna systems , 2000, IEEE Trans. Commun..
[6] Athina P. Petropulu,et al. On Ergodic Secrecy Rate for Gaussian MISO Wiretap Channels , 2011, IEEE Transactions on Wireless Communications.
[7] J. D. Parsons,et al. The Mobile Radio Propagation Channel , 1991 .
[8] H. Vincent Poor,et al. A Unified Framework for Key Agreement Over Wireless Fading Channels , 2009, IEEE Transactions on Information Forensics and Security.
[9] Suhas N. Diggavi,et al. Secret-Key Generation Using Correlated Sources and Channels , 2009, IEEE Transactions on Information Theory.
[10] Stark C. Draper,et al. Secret key generation through OFDM multipath channel , 2011, 2011 45th Annual Conference on Information Sciences and Systems.
[11] Mudhakar Srivatsa,et al. Limitations of Generating a Secret Key Using Wireless Fading Under Active Adversary , 2012, IEEE/ACM Transactions on Networking.
[12] Matthieu R. Bloch,et al. Physical-Layer Security: From Information Theory to Security Engineering , 2011 .
[13] A. D. Wyner,et al. The wire-tap channel , 1975, The Bell System Technical Journal.
[14] H. T. Mouftah,et al. The internet of things [Guest Editorial] , 2011, IEEE Commun. Mag..
[15] Andrei N. Kolmogorov,et al. On the Shannon theory of information transmission in the case of continuous signals , 1956, IRE Trans. Inf. Theory.
[16] Rao Yarlagadda,et al. Unconventional cryptographic keying variable management , 1995, IEEE Trans. Commun..
[17] Michael A. Jensen,et al. Secret Key Establishment Using Temporally and Spatially Correlated Wireless Channel Coefficients , 2011, IEEE Transactions on Mobile Computing.
[18] Boualem Boashash,et al. Time-Frequency Signal Analysis and Processing , 2002 .
[19] Jon W. Wallace. Secure Physical Layer Key Generation Schemes: Performance and Information Theoretic Limits , 2009, 2009 IEEE International Conference on Communications.
[20] W. C. Jakes,et al. Microwave Mobile Communications , 1974 .
[21] Aggelos Kiayias,et al. On passive inference attacks against physical-layer key extraction? , 2011, EUROSEC '11.
[22] Stark C. Draper,et al. Minimum energy per bit for secret key acquisition over multipath wireless channels , 2009, 2009 IEEE International Symposium on Information Theory.
[23] Jean Pierre Delmas,et al. Asymptotic eigenvalue distribution of block Toeplitz matrices and application to blind SIMO channel identification , 2001, IEEE Trans. Inf. Theory.
[24] Davide Dardari,et al. Secret key generation in correlated multi-dimensional Gaussian channels , 2014, 2014 IEEE International Conference on Communications (ICC).
[25] Moe Z. Win,et al. Wireless Network Intrinsic Secrecy , 2015, IEEE/ACM Transactions on Networking.
[26] Stark C. Draper,et al. Impact of channel sparsity and correlated eavesdropping on secret key generation from multipath channel randomness , 2010, 2010 IEEE International Symposium on Information Theory.
[27] Jon W. Wallace,et al. Automatic Secret Keys From Reciprocal MIMO Wireless Channels: Measurement and Analysis , 2010, IEEE Transactions on Information Forensics and Security.
[28] David Tse,et al. Channel Identification: Secret Sharing using Reciprocity in Ultrawideband Channels , 2007 .
[29] U. Maurer,et al. Secret key agreement by public discussion from common information , 1993, IEEE Trans. Inf. Theory.
[30] Davide Dardari,et al. A secret key exchange scheme for near field communication , 2014, 2014 IEEE Wireless Communications and Networking Conference (WCNC).
[31] Donald C. Cox,et al. Correlation analysis based on MIMO channel measurements in an indoor environment , 2003, IEEE J. Sel. Areas Commun..
[32] Shlomo Shamai,et al. Information Theoretic Security , 2009, Found. Trends Commun. Inf. Theory.
[33] Davide Dardari,et al. The effect of channel spatial correlation on physical layer security in multi-antenna scenarios , 2013, 2013 Asilomar Conference on Signals, Systems and Computers.
[34] Hai Su,et al. Secret key generation exploiting channel characteristics in wireless communications , 2011, IEEE Wireless Communications.
[35] Peng Ning,et al. Is link signature dependable for wireless security? , 2013, 2013 Proceedings IEEE INFOCOM.